City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.57.45.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15575
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;21.57.45.3.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:54:14 CST 2025
;; MSG SIZE  rcvd: 103Host 3.45.57.21.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 3.45.57.21.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 106.13.167.3 | attack | SSH Brute Force | 2020-05-15 19:02:50 | 
| 151.69.170.146 | attack | 2020-05-15 04:38:48.243972-0500 localhost sshd[52888]: Failed password for invalid user marina from 151.69.170.146 port 59183 ssh2 | 2020-05-15 18:58:35 | 
| 62.234.150.103 | attackbots | ssh intrusion attempt | 2020-05-15 19:26:56 | 
| 54.37.226.123 | attack | 2020-05-15T12:50:53.598233rocketchat.forhosting.nl sshd[4906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.226.123 2020-05-15T12:50:53.595738rocketchat.forhosting.nl sshd[4906]: Invalid user admin from 54.37.226.123 port 53270 2020-05-15T12:50:55.255939rocketchat.forhosting.nl sshd[4906]: Failed password for invalid user admin from 54.37.226.123 port 53270 ssh2 ... | 2020-05-15 18:56:44 | 
| 59.127.40.15 | attack | Scanning an empty webserver with deny all robots.txt | 2020-05-15 18:49:47 | 
| 115.75.42.231 | attackbots | SSH bruteforce more then 50 syn to 22 port per 10 seconds. | 2020-05-15 19:15:36 | 
| 180.76.232.80 | attackspambots | Invalid user test from 180.76.232.80 port 44086 | 2020-05-15 19:27:37 | 
| 177.21.197.65 | attackbots | $f2bV_matches | 2020-05-15 19:00:02 | 
| 51.254.205.160 | attackspam | WordPress XMLRPC scan :: 51.254.205.160 0.072 BYPASS [15/May/2020:08:59:34 0000] [censored_2] "POST /xmlrpc.php HTTP/1.1" 200 236 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" | 2020-05-15 19:24:22 | 
| 213.217.0.132 | attackbotsspam | May 15 13:01:11 debian-2gb-nbg1-2 kernel: \[11799320.711761\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=213.217.0.132 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=44039 PROTO=TCP SPT=41195 DPT=56760 WINDOW=1024 RES=0x00 SYN URGP=0 | 2020-05-15 19:23:02 | 
| 156.96.117.74 | attackspambots | 2020-05-15T05:48:58.238690 X postfix/smtpd[1759919]: NOQUEUE: reject: RCPT from unknown[156.96.117.74]: 554 5.7.1 Service unavailable; Client host [156.96.117.74] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/156.96.117.74 / https://www.spamhaus.org/sbl/query/SBL461359; from= | 2020-05-15 19:15:52 | 
| 190.193.177.22 | attackspambots | Invalid user user from 190.193.177.22 port 33848 | 2020-05-15 18:54:46 | 
| 61.6.247.92 | attackbots | Cluster member 192.168.0.30 (-) said, DENY 61.6.247.92, Reason:[(imapd) Failed IMAP login from 61.6.247.92 (BN/Brunei/92-247.adsl.static.espeed.com.bn): 1 in the last 3600 secs] | 2020-05-15 19:29:34 | 
| 182.161.15.205 | attackbotsspam | Hits on port : 8291(x2) | 2020-05-15 19:10:43 | 
| 69.94.235.219 | attackspam | May 15 08:37:28 prox sshd[21625]: Failed password for nobody from 69.94.235.219 port 57674 ssh2 May 15 08:43:41 prox sshd[12286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.94.235.219 | 2020-05-15 18:55:20 |